📄 secpod_trendmicro_officescan_bof_vuln_sept08_900220.nasl
字号:
############################################################################### Trend Micro OfficeScan Server cgiRecvFile.exe Buffer Overflow Vulnerability## Copyright: SecPod## Date Written: 2008/09/18## Revision: 1.1## Log: veerendragg# Issue #0223# ------------------------------------------------------------------------# This program was written by SecPod and is licensed under the GNU GPL # license. Please refer to the below link for details,# http://www.gnu.org/licenses/gpl.html# This header contains information regarding licensing terms under the GPL, # and information regarding obtaining source code from the Author. # Consequently, pursuant to section 3(c) of the GPL, you must accompany the # information found in this header with any distribution you make of this # Program.# ------------------------------------------------------------------------############################################################################## desc["english"] = " Overview : This Remote host is installed with Trend Micro OfficeScan, which is prone to Buffer Overflow Vulnerability. Vulnerability Insight : The flaw is caused due to error in cgiRecvFile.exe can be exploited to cause a stack based buffer overflow by sending a specially crated HTTP request with a long ComputerName parameter. Impact : Remote exploitation could allow execution of arbitrary code to cause complete compromise of system and failed attempt leads to denial of service condition. Impact Level : Application/System. Affected Software/OS : Trend Micro OfficeScan Corporate Edition version 8.0 Trend Micro OfficeScan Corporate Edition versions 7.0 and 7.3 Trend Micro Client Server Messaging Security (CSM) for SMB versions 2.x and 3.x Fix : Partially Fixed. Fix is available for Trend Micro OfficeScan 8.0, 7.3 and Client Server Messaging Security (CSM) 3.6. Apply patch Trend Micro OfficeScan Corporate Edition 8.0 from http://www.trendmicro.com/ftp/products/patches/OSCE_8.0_Win_EN_CriticalPatch_B1361.exe http://www.trendmicro.com/ftp/products/patches/OSCE_8.0_SP1_Win_EN_CriticalPatch_B2424.exe http://www.trendmicro.com/ftp/products/patches/OSCE_8.0_SP1_Patch1_Win_EN_CriticalPatch_B3060.exe Apply patch Trend Micro OfficeScan Corporate Edition 7.3 from http://www.trendmicro.com/ftp/products/patches/OSCE_7.3_Win_EN_CriticalPatch_B1367.exe Apply patch Trend Micro Client Server Messaging Security (CSM) 3.6 from http://www.trendmicro.com/ftp/products/patches/CSM_3.6_OSCE_7.6_Win_EN_CriticalPatch_B1195.exe References : http://secunia.com/advisories/31342/ http://securitytracker.com/alerts/2008/Sep/1020860.html http://www.juniper.net/security/auto/vulnerabilities/vuln31139.html CVSS Score : CVSS Base Score : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C) CVSS Temporal Score : 7.1 Risk factor : High";if(description){ script_id(900220); script_bugtraq_id(31139); script_cve_id("CVE-2008-2437"); script_copyright(english:"Copyright (C) 2008 SecPod"); script_version("Revision: 1.1 "); script_category(ACT_GATHER_INFO); script_family(english:"Misc."); script_name(english:"Trend Micro OfficeScan Server cgiRecvFile.exe Buffer Overflow Vulnerability."); script_summary(english:"Check for the version of Trend Micro OfficeScan"); script_description(english:desc["english"]); script_dependencies("secpod_reg_enum.nasl"); script_require_keys("SMB/WindowsVersion"); exit(0);} include("smb_nt.inc"); include("secpod_smb_func.inc"); if(!get_kb_item("SMB/WindowsVersion")){ exit(0); } scanVer = registry_get_sz(key:"SOFTWARE\TrendMicro\OfficeScan\service" + "\Information", item:"Server_Version"); if(!scanVer){ exit(0); } if(!egrep(pattern:"^([0-7]\..*|8\.0)$", string:scanVer)){ exit(0); } offPath = registry_get_sz(key:"SOFTWARE\TrendMicro\OfficeScan\service" + "\Information", item:"Local_Path"); if(!offPath){ exit(0); } report = string("\n *****\n NOTE : Ignore this warning if the above mentioned" + "patch is already applied.\n *****\n"); # For Trend Micro Client Server Messaging Security and Office Scan 8 or 7.0 if(registry_key_exists(key:"SOFTWARE\TrendMicro\CSM") || scanVer =~ "^(8\..*|[0-7]\.[0-2](\..*)?)$"){ security_hole(data:string(desc["english"], report)); exit(0); } share = ereg_replace(pattern:"([A-Z]):.*", replace:"\1$", string:offPath); file = ereg_replace(pattern:"[A-Z]:(.*)", replace:"\1", string:offPath + "Web\CGI\cgiRecvFile.exe"); name = kb_smb_name(); login = kb_smb_login(); pass = kb_smb_password(); domain = kb_smb_domain(); port = kb_smb_transport(); if(!port){ port = 139; } if(!get_port_state(port)){ exit(0); } soc = open_sock_tcp(port); if(!soc){ exit(0); } r = smb_session_request(soc:soc, remote:name); if(!r) { close(soc); exit(0); } prot = smb_neg_prot(soc:soc); if(!prot) { close(soc); exit(0); } r = smb_session_setup(soc:soc, login:login, password:pass, domain:domain, prot:prot); if(!r) { close(soc); exit(0); } uid = session_extract_uid(reply:r); r = smb_tconx(soc:soc, name:name, uid:uid, share:share); tid = tconx_extract_tid(reply:r); if(!tid) { close(soc); exit(0); } fid = OpenAndX(socket:soc, uid:uid, tid:tid, file:file); if(!fid) { close(soc); exit(0); } fileVersion = GetVersion(socket:soc, uid:uid, tid:tid, fid:fid); if(!fileVersion){ exit(0); } # grep for file version < 7.3.0.1367 if(egrep(pattern:"^7\.3\.0\.(0?[0-9]?[0-9]?[0-9]|1[0-2][0-9][0-9]|" + "13[0-5][0-9]|136[0-6])$", string:scanVer)){ security_warning(0); }
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -